Page 4 of 29 results (0.005 seconds)

CVSS: 5.9EPSS: 3%CPEs: 3EXPL: 1

The AT&T U-verse 9.2.2h0d83 firmware for the Arris NVG589 and NVG599 devices, when IP Passthrough mode is not used, configures an unauthenticated proxy service on WAN TCP port 49152, which allows remote attackers to establish arbitrary TCP connections to intranet hosts by sending \x2a\xce\x01 followed by other predictable values. El firmware ATT U-verse 9.2.2h0d83 para los dispositivos Arris NVG589 and NVG599, cuando el modo IP Passthrough no está en uso, configura un servicio de proxy sin autenticar en el puerto WAN TCP 49152, lo que permite que atacantes remotos establezcan conexiones TCP arbitrarias en hosts de intranet mediante el envío de \x2a\xce\x01 seguido por otros valores predecibles. • http://www.securityfocus.com/bid/100585 https://threatpost.com/bugs-in-arris-modems-distributed-by-att-vulnerable-to-trivial-attacks/127753 https://www.nomotion.net/blog/sharknatto • CWE-287: Improper Authentication •

CVSS: 8.1EPSS: 1%CPEs: 3EXPL: 1

The AT&T U-verse 9.2.2h0d83 firmware for the Arris NVG589, NVG599, and unspecified other devices, when IP Passthrough mode is not used, configures an sbdc.ha WAN TCP service on port 61001 with the bdctest account and the bdctest password, which allows remote attackers to obtain sensitive information (such as the Wi-Fi password) by leveraging knowledge of a hardware identifier, related to the Bulk Data Collection (BDC) mechanism defined in Broadband Forum technical reports. El firmware ATT U-verse 9.2.2h0d83 para Arris NVG589, NVG599 y otros dispositivos sin especificar, cuando el modo IP Passthrough no está en uso, configura un servicio sbdc.ha WAN TCP en el puerto 61001 con la cuenta bdctest y la contraseña bdctest, lo que permite que atacantes remotos obtengan información sensible (como la contraseña Wi-Fi) aprovechando el conocimiento de un identificador de hardware, relacionado con el mecanismo Bulk Data Collection (BDC) definido en los informes técnicos Broadband Forum. • http://www.securityfocus.com/bid/100585 https://threatpost.com/bugs-in-arris-modems-distributed-by-att-vulnerable-to-trivial-attacks/127753 https://www.nomotion.net/blog/sharknatto • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.3EPSS: 0%CPEs: 3EXPL: 1

The AT&T U-verse 9.2.2h0d83 firmware for the Arris NVG589 and NVG599 devices, when IP Passthrough mode is not used, configures ssh-permanent-enable WAN SSH logins to the remotessh account with the 5SaP9I26 password, which allows remote attackers to access a "Terminal shell v1.0" service, and subsequently obtain unrestricted root privileges, by establishing an SSH session and then entering certain shell metacharacters and BusyBox commands. El firmware ATT U-verse 9.2.2h0d83 para dispositivos Arris NVG589 y NVG599, cuando el modo IP Passthrough no está en uso, configura inicios de sesión ssh-permanent-enable WAN SSH en la cuenta remotessh con la contraseña 5SaP9I26, lo que permite que los atacantes remotos accedan a un servicio "Terminal shell v1.0" y, posteriormente, obtengan privilegios root sin restricciones estableciendo una sesión SSH e introduciendo ciertos metacaracteres shell y comandos BusyBox. • http://www.securityfocus.com/bid/100585 https://threatpost.com/bugs-in-arris-modems-distributed-by-att-vulnerable-to-trivial-attacks/127753 https://www.nomotion.net/blog/sharknatto • CWE-798: Use of Hard-coded Credentials •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

MobileIron VSP < 5.9.1 and Sentry < 5.0 has a weak password obfuscation algorithm MobileIron VSP versiones anteriores a 5.9.1 y Sentry versiones anteriores a 5.0, poseen un algoritmo débil de ofuscación de contraseña. MobileIron VSP versions prior to 5.9.1 and Sentry versions prior to 5.0 suffer from password obfuscation and XPath injection vulnerabilities. • http://seclists.org/fulldisclosure/2014/Apr/21 https://exchange.xforce.ibmcloud.com/vulnerabilities/92352 • CWE-326: Inadequate Encryption Strength •

CVSS: 6.8EPSS: 3%CPEs: 8EXPL: 0

Stack-based buffer overflow in the AT&T Connect Participant Application before 9.5.51 on Windows allows remote attackers to execute arbitrary code via a malformed .SVT file. Desbordamiento de búfer en AT T Connect Participant Application anterior a 9.5.51 sobre Windows permite a atacantes remotos ejecutar código de su elección a través de un archivo SVT mal formado. • http://www.kb.cert.org/vuls/id/346278 http://www.securityfocus.com/bid/64059 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •